2019
DOI: 10.1155/2019/9678095
|View full text |Cite
|
Sign up to set email alerts
|

ID-Based Strong Designated Verifier Signature over R-SIS Assumption

Abstract: In this paper, we propose an ID-based strong designated verifier signature (SDVS) over R-SIS assumption in the random model. We remove pre-image sampling function and Bonsai trees such complex structures used in previous lattice-based SDVS schemes. We only utilize simple rejection sampling to protect the security of our scheme. Hence, we will show our design has the shortest signature size comparing with existing lattice-based ID-based SDVS schemes. In addition, our scheme satisfies anonymity (privacy of signe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2025
2025

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…To achieve our goal of post-quantum asynchronous DAKE, we thus need a post-quantum designated verifier signature scheme. While there is a long line of research on DVS schemes from pre-quantum assumptions (including [16,26,51,59,62,78,80,87]), comparatively little is available in the literature on post-quantum DVS schemes. An isogeny-based DVS scheme was proposed in [81] but is insecure due to key reuse attacks identified in [46].…”
Section: Our Contributionsmentioning
confidence: 99%
See 2 more Smart Citations
“…To achieve our goal of post-quantum asynchronous DAKE, we thus need a post-quantum designated verifier signature scheme. While there is a long line of research on DVS schemes from pre-quantum assumptions (including [16,26,51,59,62,78,80,87]), comparatively little is available in the literature on post-quantum DVS schemes. An isogeny-based DVS scheme was proposed in [81] but is insecure due to key reuse attacks identified in [46].…”
Section: Our Contributionsmentioning
confidence: 99%
“…A long line of research has scrutinized the security of DVS schemes in different settings, including [16,26,51,59,62,78,80,87]. For the purpose of this paper, it suffices to define the security notions of unforgeability and source hiding.…”
Section: Designated Verifier Signaturesmentioning
confidence: 99%
See 1 more Smart Citation
“…A series of designated verifier signatures with particular functions were proposed [17][18][19][20][21][22][23][24][25]. For example, to solve the key management problem, Huang et al proposed an identity-based SDVS [26].…”
Section: Related Workmentioning
confidence: 99%
“…They also proved the basic security requirement of their scheme in the standard model. Up to present, various DVS variants 1939 have been proposed. Still, none of existing DVS systems deals with the issue of lifetime of signing capability.…”
Section: Introductionmentioning
confidence: 99%